Cybersecurity Personally Identifiable Information

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Federal Data Breach Bill Stalled in Congress

A key distinguishing feature of U.S. data privacy laws is their patchwork nature. There are industry-specific data privacy laws at the federal level (think HIPAA or the GLBA), yet there are no comprehensive federal standards...more

This Is Not Your Father's Oldsmobile: Car Hacking and the SPY Car Act

Not coincidentally, on July 21, 2015, Wired Magazine published an article with groundbreaking evidence of hacking a car wirelessly, and Senators Edward Markey (D-Mass.) and Richard Blumenthal (D-Conn.) introduced legislation...more

GAO Issues Report Citing Shortcomings In Federal Government Cybersecurity

On July 8, 2015, the Government Accountability Office (“GAO”) issued a report finding that agencies across the federal government continue to have shortcomings in preventing, detecting, and responding to cyber threats. The...more

Cybersecurity is once again a hot topic as Illinois undergoes PIPA update

Cybersecurity is a hot topic at both the state and federal level. Specifically, Illinois is in the process of amending its Personal Information Protection Act (“PIPA”). Illinois SB 1833 will amend PIPA by establishing more...more

Class Is in Session: The FTC Launches New Data Security Initiative

Why it matters - The Federal Trade Commission (FTC) kicked off a new educational initiative to provide guidance to businesses in the area of data security. Based on the lessons learned from more than 50 of the agency's...more

FTC's New Consumer Data Security Guidance Offers Businesses Practical Tips

The Federal Trade Commission has issued new guidance on data security for companies that collect, store and use consumer information, gleaned from the more than 50 enforcement actions brought by the agency over the past...more

China Proposes Draft Privacy Legislation with Significant Potential Implications

On July 6, 2015, China’s legislature, the National People’s Congress (NPC), circulated for comment two pieces of draft legislation with significant potential implications for data privacy and data security in China. Comments...more

With No Federal Law in Sight, States Continue to Refine Their Own Data Privacy Laws

With no Congressional consensus to adopt a federal data privacy and breach notification statute, states are updating and refining their already-existing laws to enact more stringent requirements for companies. Two states...more

Also In the News - Data, Privacy, & Security Practice Report - July 2015 #2

FCC Working Group Issues Report On Cybersecurity Best Practices – The June 2015 issue of the Intellectual Property & Technology Law Journal features an article by King & Spalding partner Steven Snyder on a Federal...more

UCLA Health System announces data breach affecting 4.5 million patients and medical providers

Adding to the long list of cyber hacking victims, the UCLA Health System announced on Friday (July 17, 2015) that it confirmed on May 5, 2015 that a cyber-attacker had accessed parts of UCLA Health’s network back to September...more

You Can’t Just WISPer – Employers Must Publish or Display Security Policies

WISP is the acronym for Written Information Security Policy. The information at issue is an individual’s personal information and identifiers, such as a Social Security number, driver’s license number, credit or debit card...more

Blog: UCLA Health Announces It Was A Victim of a Cybersecurity Attack

UCLA Health announced today that it was the victim of a cybersecurity attack. The press report disseminated by UCLA Health noted there is evidence that computer systems containing sensitive personal data and health data was...more

Is a Uniform Federal Data Breach Law Really Necessary?

In June 2015, the United States Office of Personnel Management announced a massive data breach. Estimates are that the breach compromises the personal information of up to 18 million current, former and potential federal...more

Privacy Monday – July 2015

Welcome to the dog days of summer 2015. Three privacy & security bits and bytes to start your week (if you are reading this on vacation … good for you!) 1. ICYMI: Massive Data Breach at OPM Claims Victim — The Director...more

Data Breach Decisions Setting A Higher Threshold For Standing For Plaintiffs Do Not Mean Businesses Are Off The Hook

There are only two types of companies left in the United States: those that have been hacked and those that will be hacked. In the last year alone, forty-three percent (43%) of U.S. companies experienced a data breach,...more

Connecticut Imposes New Data Security Obligations

New law will require consumer breach notice within 90 days, identity theft protection for consumers,“kill switch” for smartphones, and implementation of data security programs for certain health providers, state agencies and...more

[Webinar] Personally Identifiable Information: Employer Risks & Responsibilities - July 16, 12:00pm CDT

Please join us from Noon-1:00 p.m. CDT on Thursday, July 16 for an informative and timely webinar where we will address these questions: Did you know that hackers often use your employees to get into your company's...more

Russia’s data localization requirement will take effect September 1

Russia’s much publicized changes to its data protection rules come into force as of September 1, 2015. These changes are broadly, and vaguely, written and apply to almost anyone handling the personal data of Russian...more

Russia’s data localization requirement will take effect September 1

Russia’s much publicized changes to its data protection rules come into force as of September 1, 2015. These changes are broadly, and vaguely, written and apply to almost anyone handling the personal data of Russian...more

FTC announces data security guidance for businesses

We (and others) often comment on the Federal Trade Commission’s (FTC) increased enforcement activity of data security issues, particularly with the Wyndham and LabMD cases, and the fact that it is enforcing data security...more

2015 Data Breach Legislation Six Month Review: Many Proposals, Few Changes

The heat of summer may be upon us, but in Congress and in many state legislatures the attitude toward passing major data breach legislation has considerably cooled. We predicted some months ago that 2015 might be the...more

Blog: States Strengthen Laws Addressing Health Information Handling and Breach Response

Connecticut and Oregon were recently added to the increasing list of states adopting stricter laws addressing the handling of health information and penalties in connection with breaches of health information. Both states...more

Liability for Data Breach Involving Employee Information: Even the Federal Government and Third Party Vendors Are Not Immune

In what is quickly becoming the newest trending topic in class action litigation, another class action has been filed alleging the disclosure of employee personally identifiable information due to a cyber attack. This...more

Federal Employees’ Personal Information Compromised by Data Breach

In recent headlines, the Office of Personnel Management (“OPM”) has begun notifying millions of federal employees that it may have lost their personal information earlier this month in a data breach. The data breach...more

RadioShack’s Consumer Data: A Highly Scrutinized Asset

Following the Texas Attorney General’s objection to the sale of RadioShack Corporation’s consumer data as an asset in its bankruptcy, 37 other state attorneys general and a large number of other consumer protection entities...more

188 Results
|
View per page
Page: of 8

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×